The Neuroethics of Brainprinting
By Anna Farrell

As cyber espionage and hacking are on the rise (Watson, 2016), major corporations, governments, and financial systems have pushed for using biometrics as a more secure way to guard their data. Biometrics measures unique physical characteristics as a way of ascertaining someone’s identity. A wide range of physical characteristics are currently used in biometrics, including DNA, iris, retina, face, fingerprint, finger geometry, hand geometry, odor, vein, and voice identification (Types of Biometrics). Governmental uses for biometrics span border control, customs services, and online access to critical systems. However, fingerprint and iris identification results are becoming more replicable as hacker’s abilities advance (Watson, 2016), causing researchers to begin to look beyond the typical biometric features. One of the new methods being studied is electroencephalogram (EEG)-based neurological identification. However, using brain wave biometrics as a means of identification establishes a framework which, if underestimated, could put sensitive personal data in jeopardy.
Lawrence Farwell invented Brain Fingerprinting as a method of determining what information is contained in the brain (Ahuja, & Singh, 2012). This began in 1986 with the investigation of event related potentials. Event related potentials under the P300 response category are electrical signals that occur 300 milliseconds after the subject has been shown a stimulus that is recognized as familiar (Farwell, 2014). Over time, many Brain Fingerprinting methods developed with additional factors supplementing the analysis of the P300 brain response. One of the more prevalent approaches produces a neurological reaction named the “memory and encoding related multifaceted encoding electroencephalographic response” or MERMER (Ahuja, et al., 2012).
![]() |
This image depicts Dr. Lawrence Farwell conducting a Brain Fingerprinting test on Terry Harrington. (Image courtesy of Wikimedia Commons.) |
Now, Farwell’s brain fingerprinting is being researched so that it can be applied to neurological authentication systems. The argument for the development of neurological authentication systems is compelling because brains are physically less accessible to hackers than are fingerprints or DNA, and are thus harder to falsify. However, interference from the skin and skull can make it difficult to get a good signal from an EEG (Usakali, 2010), which may lead to inconsistencies in signal identification. More recently, functional near-infrared spectroscopy (fNIR) security systems have been developed, which have a much higher signal-to-noise ratio than EEG. While EEG systems measure electrical brain activity (Spine, 2016), fNIR measures blood flow in the brain like a fMRI, allowing the method greater spatial resolution but with the mobility of the EEG system (Strait, & Scheutz, 2014).
![]() |
A sample of human EEG data. (Image courtesy of Wikimedia Commons.) |
Although these technologies are not ready for commercial use, ethical complications ought to be analyzed before the hypothetical becomes reality. Serwadda states that in the wrong hands, these brain waves could be used to gain insight into employees’ possible mental health conditions, learning disabilities, substance abuse, and more (Watson, 2016). Although this is speculative, it rightly emphasizes precaution as we continue to develop authentication measures. If this sort of sensitive information could be gleaned from the EEG system, the unwarranted access that could be surrendered with the data collected by the fNIR security system should certainly not be underestimated.
![]() |
Image courtesy of Pexels. |
Other concerns about neural fingerprinting focus on how their implementation may infringe on our constitutional rights. Should neurological data be treated like other non-invasive physiological samples, such as blood or urine? Or does it qualify as testimony, deserving protection under privacy? As brain fingerprinting data does not fit into either realm fully, some are advocating for a new legal framework to address possible violations of constitutional rights, specifically the fourth (Farahany, 2012) and fifth (Waller, Bernstein, & Ladov, 2012) amendments. The 4th amendment protects the individual from unreasonable searches and seizure. The 5th amendment guarantees that no one should have to testify against themselves. Possible inaccuracies of the proposed methods further cloud the discussion if these technologies are ever to be called upon in a legal setting.
![]() |
Image courtesy of Wikimedia Commons. |
Dialogue revolving around ownership of brain data and how security systems should go about receiving consent for brain data access is essential to creating a safe and effective means of security authentication services. Research highlighting the possible compromises we may face with brain biometrics is guided by the above principles and must continue to be so guided, to ensure our autonomy over our brain data in the face of technological advances.
References
Ahuja, D., & Singh, B. (2012). Brain fingerprinting. Journal of Engineering and Technology Research ,4(6), 98-113. doi: 10.5897/JETR11.061
Basulto, D. (2014, November 21). The heartbeat vs. the fingerprint in the battle for biometric authentication. Retrieved March 28, 2017, from https://www.washingtonpost.com/news/innovations/wp/2014/11/21/the-heartbeat-vs-the-fingerprint-in-the-battle-for-biometric-authentication/?utm_term=.ad6577f7b338
Behavioral Biometrics. (n.d.). Retrieved April 20, 2017, from https://www.secureauth.com/products/secureauth-idp/behavioral-biometrics
Beyond therapy: biotechnology and the pursuit of happiness. (2004). Choice Reviews Online, 42(03). doi:10.5860/choice.42-1550
Bonaci, T., Calo, R., & Chizeck, H. J. (2015). App Stores for the Brain : Privacy and Security in Brain-Computer Interfaces. IEEE Technology and Society Magazine,34(2), 32-39. doi:10.1109/mts.2015.2425551
Chuang, J., Nguyen, H., Wang, C., & Johnson, B. (2013). I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves. Financial Cryptography and Data Security Lecture Notes in Computer Science, 1-16. doi:10.1007/978-3-642-41320-9_1
Dalbey, B. (1999, August 17). Farwell's Brain Fingerprinting traps serial killer in Missouri. Retrieved May 18, 2017, from http://www.cutbankpioneerpress.com/news/article_a0efcd6e-a9df-57f9-bbcf-5b71f9f2f44b.html
Farah, M. (2015). An Ethics Toolbox for Neurotechnology. Neuron, 86(1), 34-37. doi:10.1016/j.neuron.2015.03.038
Farahany, N. A. (2012). Searching Secrets. University of Pennsylvania Law Review,160(5), 1239-1308. Retrieved August 13, 2017.
Farwell, L. A. (2014). Brain Fingerprinting: Detection of Concealed Information. Wiley Encyclopedia of Forensic Science, 1-12. doi:10.1002/9780470061589.fsa1013
Farwell, L. A., & Makeig, T. H. (2005).
Farwell Brain Fingerprinting in the case of Harrington v. State. Open Court X, Indiana State Bar Assoc., 7-10. Retrieved May 17, 2017.
Goodman, M. (2015, February 24). Fingerprint and Iris Scanners Seem Secure, but They Aren’t Hack-Proof. Retrieved March 10, 2017, from
http://www.slate.com/articles/technology/future_tense/2015/02/future_crimes_excerpt_how_hackers_can_steal_fingerprints_and_more.html
Harrington v. State (February 26, 2003), FindLaw 01-0653.
Holley, B. (2009). It’s All in Your Head: Neurotechnological Lie Detection and the Fourth and Fifth Amendments . The Institute of Law, Psychiatry & Public Policy-The University of Virginia,28(1), 1-76. Retrieved April 20, 2017.
Jimmy Ray Slaughter. (n.d.). Retrieved May 18, 2017, from http://www.clarkprosecutor.org/html/death/US/slaughter955.htm
Matovu, R., & Serwadda, A. (2016). Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system. 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS). doi:10.1109/btas.2016.7791210
Larkin, P. (2011, December 9). How Must America Balance Security and Liberty. Retrieved March 26, 2017, from http://www.heritage.org/homeland-security/report/how-must-america-balance-security-and-liberty
Liberatore, S. (2016, August 04). Hackers could get inside your BRAIN: Experts warn of growing threat from monitoring and controlling neural signals. Retrieved April 21, 2017, from http://www.dailymail.co.uk/sciencetech/article-3722558/Hackers-inside-BRAIN-Experts-warn-growing-threat-monitoring-controlling-neural-signals.html
Purcell, R., & Rommelfanger, K. (2015). Internet-Based Brain Training Games, Citizen Scientists, and Big Data: Ethical Issues in Unprecedented Virtual Territories.Neuron,86(2), 356-359. doi:10.1016/j.neuron.2015.03.044
Rangaswamy, M., Porjesz, B., Chorlian, D. B., Wang, K., Jones, K. A., Bauer, L. O., . . . Begleiter, H. (2002). Beta power in the EEG of alcoholics. Biological Psychiatry, 52(8), 831-842. doi:10.1016/s0006-3223(02)01362-8
Strait, M., & Scheutz, M. (2014). What we can and cannot (yet) do with functional near infrared spectroscopy. Frontiers in Neuroscience, 8. doi:10.3389/fnins.2014.00117
Strong, K. (2014). “Pass-thoughts” and non-deliberate physiological computing: When passwords and keyboards become obsolete. The Neuroethics Blog. Retrieved on April 20, 2017, from http://www.theneuroethicsblog.com/2014/07/pass-thoughts-and-non-deliberate.html
Spine, M. B. (2014, April). Electroencephalogram (EEG). Retrieved March 26, 2017, from http://www.mayfieldclinic.com/PE-EEG.htm
The issues with biometric systems. (n.d.). Retrieved March 10, 17 from
http://www.biometricnewsportal.com/biometrics_issues.asp
Types of Biometrics. (n.d.). Retrieved March 26, 2017, from http://www.biometricsinstitute.org/types-of-biometrics
Ulman , Y. I., Cakar, T., & Yildiz, G. (2015). Ethical Issues in Neuromarketing: “I Consume, Therefore I am!”,. Science and Engineering Ethics,20. doi:DOI 10.1007/s11948-014-9581-5
Usakli, A. B. (2010). Improvement of EEG Signal Acquisition: An Electrical Aspect for State of the Art of Front End. Computational Intelligence and Neuroscience,2010, 1-7. doi:10.1155/2010/630649
Waller, G., Bernstein, S., & Ladov, L. (Directors). (2012, March 20). Neuroimaging in the Courtroom: Video by Neuroethics Creative Team[Video file]. Retrieved August 13, 2017, from http://www.theneuroethicsblog.com/2012/03/neuroimaging-in-courtroom-video-by.html
Watson, G. (2016, September 30). Professor Shows Brain Waves Can be Used to Detect Potentially Harmful Personal Information. Retrieved February 20, 2017, from http://today.ttu.edu/posts/2016/09/brain-waves
Want to cite this post?
Farrell, A. (2017). The Neuroethics of Brainprinting. The Neuroethics Blog. Retrieved on , from http://www.theneuroethicsblog.com/2017/09/the-neuroethics-of-brainprinting.html